Data leak | Denial of Service | GPS/AIS jamming/spoofing | Human error | Intrusion | Legitimate access | Malfunction | Phishing | Physical hijack | Remote Access | Scam | Spearphishing | Undisclosed | Virus/Ransomware | Waterholing Attack | Website Compromission